parent
def4b728d0
commit
61070698cc
11 changed files with 79 additions and 211 deletions
|
@ -1,57 +0,0 @@
|
|||
/*
|
||||
Copyright 2023 The Matrix.org Foundation C.I.C.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
import { test, expect } from "../../element-web-test";
|
||||
|
||||
test.describe("Backups", () => {
|
||||
test.use({
|
||||
displayName: "Hanako",
|
||||
});
|
||||
|
||||
test("Create, delete and recreate a keys backup", async ({ page, user, app }, workerInfo) => {
|
||||
// skipIfLegacyCrypto
|
||||
test.skip(
|
||||
workerInfo.project.name === "Legacy Crypto",
|
||||
"This test only works with Rust crypto. Deleting the backup seems to fail with legacy crypto.",
|
||||
);
|
||||
|
||||
// Create a backup
|
||||
const tab = await app.settings.openUserSettings("Security & Privacy");
|
||||
await expect(tab.getByRole("heading", { name: "Secure Backup" })).toBeVisible();
|
||||
await tab.getByRole("button", { name: "Set up", exact: true }).click();
|
||||
const dialog = await app.getDialogByTitle("Set up Secure Backup", 60000);
|
||||
await dialog.getByRole("button", { name: "Continue", exact: true }).click();
|
||||
await expect(dialog.getByRole("heading", { name: "Save your Security Key" })).toBeVisible();
|
||||
await dialog.getByRole("button", { name: "Copy", exact: true }).click();
|
||||
const securityKey = await app.getClipboard();
|
||||
await dialog.getByRole("button", { name: "Continue", exact: true }).click();
|
||||
await expect(dialog.getByRole("heading", { name: "Secure Backup successful" })).toBeVisible();
|
||||
await dialog.getByRole("button", { name: "Done", exact: true }).click();
|
||||
|
||||
// Delete it
|
||||
await app.settings.openUserSettings("Security & Privacy");
|
||||
await expect(tab.getByRole("heading", { name: "Secure Backup" })).toBeVisible();
|
||||
await tab.getByRole("button", { name: "Delete Backup", exact: true }).click();
|
||||
await dialog.getByTestId("dialog-primary-button").click(); // Click "Delete Backup"
|
||||
|
||||
// Create another
|
||||
await tab.getByRole("button", { name: "Set up", exact: true }).click();
|
||||
dialog.getByLabel("Security Key").fill(securityKey);
|
||||
await dialog.getByRole("button", { name: "Continue", exact: true }).click();
|
||||
await expect(dialog.getByRole("heading", { name: "Success!" })).toBeVisible();
|
||||
await dialog.getByRole("button", { name: "OK", exact: true }).click();
|
||||
});
|
||||
});
|
|
@ -103,12 +103,35 @@ export async function checkDeviceIsCrossSigned(app: ElementAppPage): Promise<voi
|
|||
}
|
||||
|
||||
/**
|
||||
* Check that the current device is connected to the key backup.
|
||||
* Check that the current device is connected to the expected key backup.
|
||||
* Also checks that the decryption key is known and cached locally.
|
||||
*
|
||||
* @param page - the page to check
|
||||
* @param expectedBackupVersion - the version of the backup we expect to be connected to.
|
||||
* @param checkBackupKeyInCache - whether to check that the backup key is cached locally.
|
||||
*/
|
||||
export async function checkDeviceIsConnectedKeyBackup(page: Page) {
|
||||
export async function checkDeviceIsConnectedKeyBackup(
|
||||
page: Page,
|
||||
expectedBackupVersion: string,
|
||||
checkBackupKeyInCache: boolean,
|
||||
): Promise<void> {
|
||||
await page.getByRole("button", { name: "User menu" }).click();
|
||||
await page.locator(".mx_UserMenu_contextMenu").getByRole("menuitem", { name: "Security & Privacy" }).click();
|
||||
await expect(page.locator(".mx_Dialog").getByRole("button", { name: "Restore from Backup" })).toBeVisible();
|
||||
|
||||
// expand the advanced section to see the active version in the reports
|
||||
await page.locator(".mx_SecureBackupPanel_advanced").locator("..").click();
|
||||
|
||||
if (checkBackupKeyInCache) {
|
||||
const cacheDecryptionKeyStatusElement = page.locator(".mx_SecureBackupPanel_statusList tr:nth-child(2) td");
|
||||
await expect(cacheDecryptionKeyStatusElement).toHaveText("cached locally, well formed");
|
||||
}
|
||||
|
||||
await expect(page.locator(".mx_SecureBackupPanel_statusList tr:nth-child(5) td")).toHaveText(
|
||||
expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)",
|
||||
);
|
||||
|
||||
await expect(page.locator(".mx_SecureBackupPanel_statusList tr:nth-child(6) td")).toHaveText(expectedBackupVersion);
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -33,6 +33,9 @@ import { Bot } from "../../pages/bot";
|
|||
test.describe("Device verification", () => {
|
||||
let aliceBotClient: Bot;
|
||||
|
||||
/** The backup version that was set up by the bot client. */
|
||||
let expectedBackupVersion: string;
|
||||
|
||||
test.beforeEach(async ({ page, homeserver, credentials }) => {
|
||||
// Visit the login page of the app, to load the matrix sdk
|
||||
await page.goto("/#/login");
|
||||
|
@ -49,9 +52,13 @@ test.describe("Device verification", () => {
|
|||
bootstrapSecretStorage: true,
|
||||
});
|
||||
aliceBotClient.setCredentials(credentials);
|
||||
await aliceBotClient.prepareClient();
|
||||
const mxClientHandle = await aliceBotClient.prepareClient();
|
||||
|
||||
await page.waitForTimeout(20000);
|
||||
|
||||
expectedBackupVersion = await mxClientHandle.evaluate(async (mxClient) => {
|
||||
return await mxClient.getCrypto()!.getActiveSessionBackupVersion();
|
||||
});
|
||||
});
|
||||
|
||||
// Click the "Verify with another device" button, and have the bot client auto-accept it.
|
||||
|
@ -87,7 +94,9 @@ test.describe("Device verification", () => {
|
|||
await checkDeviceIsCrossSigned(app);
|
||||
|
||||
// Check that the current device is connected to key backup
|
||||
await checkDeviceIsConnectedKeyBackup(page);
|
||||
// For now we don't check that the backup key is in cache because it's a bit flaky,
|
||||
// as we need to wait for the secret gossiping to happen and the settings dialog doesn't refresh automatically.
|
||||
await checkDeviceIsConnectedKeyBackup(page, expectedBackupVersion, false);
|
||||
});
|
||||
|
||||
test("Verify device with QR code during login", async ({ page, app, credentials, homeserver }) => {
|
||||
|
@ -130,7 +139,9 @@ test.describe("Device verification", () => {
|
|||
await checkDeviceIsCrossSigned(app);
|
||||
|
||||
// Check that the current device is connected to key backup
|
||||
await checkDeviceIsConnectedKeyBackup(page);
|
||||
// For now we don't check that the backup key is in cache because it's a bit flaky,
|
||||
// as we need to wait for the secret gossiping to happen and the settings dialog doesn't refresh automatically.
|
||||
await checkDeviceIsConnectedKeyBackup(page, expectedBackupVersion, false);
|
||||
});
|
||||
|
||||
test("Verify device with Security Phrase during login", async ({ page, app, credentials, homeserver }) => {
|
||||
|
@ -150,7 +161,8 @@ test.describe("Device verification", () => {
|
|||
await checkDeviceIsCrossSigned(app);
|
||||
|
||||
// Check that the current device is connected to key backup
|
||||
await checkDeviceIsConnectedKeyBackup(page);
|
||||
// The backup decryption key should be in cache also, as we got it directly from the 4S
|
||||
await checkDeviceIsConnectedKeyBackup(page, expectedBackupVersion, true);
|
||||
});
|
||||
|
||||
test("Verify device with Security Key during login", async ({ page, app, credentials, homeserver }) => {
|
||||
|
@ -172,7 +184,8 @@ test.describe("Device verification", () => {
|
|||
await checkDeviceIsCrossSigned(app);
|
||||
|
||||
// Check that the current device is connected to key backup
|
||||
await checkDeviceIsConnectedKeyBackup(page);
|
||||
// The backup decryption key should be in cache also, as we got it directly from the 4S
|
||||
await checkDeviceIsConnectedKeyBackup(page, expectedBackupVersion, true);
|
||||
});
|
||||
|
||||
test("Handle incoming verification request with SAS", async ({ page, credentials, homeserver, toasts }) => {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue